Open Source Intelligence Training
Find Vulnerable ports with Nmap
NMAP
Nmap Advanced
Getting Publicly available Information (Maltego)
Whois Lookup
How to use Netcraft
How to use Robtex
Collecting Subdomain
Scan for all the files and Directory
Google Hacking Database and Google Dorks
SQL injection in Login
SQL Injection in Get Method
Blind SQL Injection
Cross Site Scripting (XSS)
Beef XSS
Setting up foxy proxy
Code Execution Vulnerability
Code Execution Vulnerability Part-2
Local File inclusion
Local File Inclusion Part-2
Local File Inclusion Part-3
Remote File inclusion
Remote File Inclusion Part-2
File Upload Vulnerability with Burp
Session Hijacking
Social Engineering
Denial-of-Service
Hacking Mobile Platforms
IoT Hacking
Malware Threats
Dealing with a Data Breach
Attacks and Defenses
Privacy Concerns
Smart Contracts (Blockchain and Cryptocurrencies)
Secure Mobile and Web App Development
Control Hijacking Attacks
Isolation
Static Analysis, Dynamic Analysis, and Fuzzing
Language-Based Security
Hacking Windows
Cracking Windows Password
What are TOR and Hidden services?
Deepweb vs Darkweb
Social Media on TOR
How to crack WPA/WPA2 Security
Cracking MD5/SHA1/SHA256
Captive Portal Security Bypass
How to change the Mac address of your computer?
Making Wordlist file for Brute Forcing
Automate wifi hacking
MITM
Network Sniffing with Wireshark
Evading IDS, Firewalls, and Honeypots
Cloud Security Part 1
Cloud Security part 2
Disk Image Forensics
Linux System Auditing
Process of Digital Forensics Investigations
Incident Management
Know what it means to be a Certified Cybersecurity Specialist